summaryrefslogtreecommitdiff
path: root/lib/_tls_common.js
diff options
context:
space:
mode:
authorShigeki Ohtsu <ohtsu@iij.ad.jp>2014-08-27 18:00:13 +0900
committerFedor Indutny <fedor@indutny.com>2014-08-29 00:36:48 +0400
commit0dfedb7127ac388f66f5ea5d38330c86af6539b5 (patch)
tree0945fdc64f2bd89c3cf60bf1ec65c59d3c37a3b6 /lib/_tls_common.js
parent6e453fad87c51dc15327628aa75886d3fbb3fa1c (diff)
downloadandroid-node-v8-0dfedb7127ac388f66f5ea5d38330c86af6539b5.tar.gz
android-node-v8-0dfedb7127ac388f66f5ea5d38330c86af6539b5.tar.bz2
android-node-v8-0dfedb7127ac388f66f5ea5d38330c86af6539b5.zip
tls, crypto: add DHE support
In case of an invalid DH parameter file, it is sliently discarded. To use auto DH parameter in a server and DHE key length check in a client, we need to wait for the next release of OpenSSL-1.0.2. Reviewed-By: Fedor Indutny <fedor@indutny.com>
Diffstat (limited to 'lib/_tls_common.js')
-rw-r--r--lib/_tls_common.js2
1 files changed, 2 insertions, 0 deletions
diff --git a/lib/_tls_common.js b/lib/_tls_common.js
index 72128496e7..f7f2ad86e5 100644
--- a/lib/_tls_common.js
+++ b/lib/_tls_common.js
@@ -97,6 +97,8 @@ exports.createSecureContext = function createSecureContext(options, context) {
else if (options.ecdhCurve)
c.context.setECDHCurve(options.ecdhCurve);
+ if (options.dhparam) c.context.setDHParam(options.dhparam);
+
if (options.crl) {
if (util.isArray(options.crl)) {
for (var i = 0, len = options.crl.length; i < len; i++) {